Letteratura scientifica selezionata sul tema "ILLEGITIMATE SERVER"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "ILLEGITIMATE SERVER".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "ILLEGITIMATE SERVER"
Jan, Saeed Ullah, e Fawad Qayum. "A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis". Network and Communication Technologies 3, n. 1 (26 aprile 2018): 6. http://dx.doi.org/10.5539/nct.v3n1p6.
Testo completoRazaque, Abdul, e Khaled Elleithy. "Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment". Journal of Communications and Computer Engineering 3, n. 1 (13 ottobre 2012): 15. http://dx.doi.org/10.20454/jcce.2013.426.
Testo completoBrindha, K., e N. Jeyanthi. "Secured Document Sharing Using Visual Cryptography in Cloud Data Storage". Cybernetics and Information Technologies 15, n. 4 (1 novembre 2015): 111–23. http://dx.doi.org/10.1515/cait-2015-0058.
Testo completoChao, Han-Chieh, Hsin-Te Wu e Fan-Hsun Tseng. "AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing". Sustainability 13, n. 6 (10 marzo 2021): 3048. http://dx.doi.org/10.3390/su13063048.
Testo completoHaruna, Saibu Aliyu, Raphael Olufemi Akinyede e Boyinbode Olutayo Kehinde. "NEURO-FUZZY DATA MINING SYSTEM FOR IDENTIFYING E-COMMERCE RELATED THREATS". MALAYSIAN JOURNAL OF COMPUTING 5, n. 2 (9 settembre 2020): 537. http://dx.doi.org/10.24191/mjoc.v5i2.8642.
Testo completoPeriyasamy, A. R. Pon. "Security Issues of Firewall". International Journal of Advanced Research in Computer Science and Software Engineering 7, n. 7 (30 luglio 2017): 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.
Testo completoRazaque, Abdul, Nazerke Shaldanbayeva, Bandar Alotaibi, Munif Alotaibi, Akhmetov Murat e Aziz Alotaibi. "Big Data Handling Approach for Unauthorized Cloud Computing Access". Electronics 11, n. 1 (3 gennaio 2022): 137. http://dx.doi.org/10.3390/electronics11010137.
Testo completoPurwoleksono, Didik Endro. "THE APPLICABILITY OF ARTICLE 4 OF ANTI-CORRUPTION LAW AND THE THEORY OF TORT". Yuridika 34, n. 1 (1 gennaio 2019): 21. http://dx.doi.org/10.20473/ydk.v34i1.7552.
Testo completoLewin, Linda. "Natural and Spurious Children in Brazilian Inheritance Law From Colony to Empire: A Methodological Essay". Americas 48, n. 3 (gennaio 1992): 351–96. http://dx.doi.org/10.2307/1007241.
Testo completoBoulton, S. J., e S. P. Jackson. "Saccharomyces cerevisiae Ku70 potentiates illegitimate DNA double-strand break repair and serves as a barrier to error-prone DNA repair pathways." EMBO Journal 15, n. 18 (settembre 1996): 5093–103. http://dx.doi.org/10.1002/j.1460-2075.1996.tb00890.x.
Testo completoTesi sul tema "ILLEGITIMATE SERVER"
DHAMA, VIKRANT. "ANALYZING SECURITY BREACH AND DATA LEAKAGE IN MOBILE APPLICATIONS USING ILLEGITIMATE SERVER CONNECTIONS". Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15024.
Testo completoLibri sul tema "ILLEGITIMATE SERVER"
Bernhardt, Elizabeth Louise. Genevra Sforza and the Bentivoglio. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463726849.
Testo completoAndrade, Nathanael. Civil War. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190638818.003.0009.
Testo completoVarol, Ozan O. The Enemy Within. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190626013.003.0012.
Testo completoOkeke, Edward Chukwuemeke. Conclusion. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190611231.003.0011.
Testo completoBergeron, David M. The Duke of Lennox, 1574-1624. Edinburgh University Press, 2022. http://dx.doi.org/10.3366/edinburgh/9781399500449.001.0001.
Testo completoDelmas, Candice. Justice and Democracy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190872199.003.0004.
Testo completoGleave, Robert, e István Kristó-Nagy, a cura di. Violence in Islamic Thought from the Qur'an to the Mongols. Edinburgh University Press, 2015. http://dx.doi.org/10.3366/edinburgh/9780748694235.001.0001.
Testo completoZola, Émile. The Fortune of the Rougons. Tradotto da Brian Nelson. Oxford University Press, 2012. http://dx.doi.org/10.1093/owc/9780199560998.001.0001.
Testo completoCollins, Wilkie. The Dead Secret. A cura di Ira B. Nadel. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536719.001.0001.
Testo completoCapitoli di libri sul tema "ILLEGITIMATE SERVER"
Dalai, Asish Kumar, e Sanjay Kumar Jena. "Online Identification of Illegitimate Web Server Requests". In Communications in Computer and Information Science, 123–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_15.
Testo completoSwami, Rochak, Mayank Dave e Virender Ranga. "DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN". In Research Anthology on Combating Denial-of-Service Attacks, 248–64. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch013.
Testo completoSwami, Rochak, Mayank Dave e Virender Ranga. "DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN". In Security and Privacy Issues in Sensor Networks and IoT, 193–214. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0373-7.ch008.
Testo completoDaci, Genti, e Rezarta Jaupi. "IP Layer Client Puzzles". In Enterprise Business Modeling, Optimization Techniques, and Flexible Information Systems, 14–25. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3946-1.ch002.
Testo completoMac Amhlaigh, Cormac S. "What’s Wrong with Constitutionalism? Between Cacophony and Coercion". In New Constitutional Horizons, 134—C6.N117. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780198852339.003.0006.
Testo completoLenowitz, Jeffrey A. "Ratification beyond (and before) Constitutions". In Constitutional Ratification without Reason, 40–63. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780198852346.003.0002.
Testo completoSowjanya, K. K., K. P. B. Madavi e G. Thahniyath. "Preserving the Privacy of Wearable IoT Device Data Using Blockchain". In Blockchain Applications in Cybersecurity Solutions, 97–116. BENTHAM SCIENCE PUBLISHERS, 2023. http://dx.doi.org/10.2174/9789815080599123010009.
Testo completoRai, Mridu. "Kashmiris in the Hindu Rashtra". In Majoritarian State, 259–80. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190078171.003.0015.
Testo completoJackson, Emily. "9. Genetic Information". In Medical Law, 470–505. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198825845.003.0009.
Testo completoGrant, Ruth W. "Ethical and Not So Ethical Incentives". In Strings Attached. Princeton University Press, 2011. http://dx.doi.org/10.23943/princeton/9780691151601.003.0004.
Testo completoAtti di convegni sul tema "ILLEGITIMATE SERVER"
Gill, Grandon. "The Predatory Journal: Victimizer or Victim?" In InSITE 2021: Informing Science + IT Education Conferences. Informing Science Institute, 2021. http://dx.doi.org/10.28945/4780.
Testo completoLauc, Zvonimir, e Marijana Majnarić. "EU LEGAL SYSTEM AND CLAUSULA REBUS SIC STANTIBUS". In EU 2021 – The future of the EU in and after the pandemic. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18352.
Testo completo